SPIoT 2011 - 2011 IEEE International Workshop on Security and Privacy in Internet of Things (IEEE SPIoT 2011)
Topics/Call fo Papers
2011 IEEE International Workshop on Security and Privacy in Internet of Things
(IEEE SPIoT 2011)
In conjunction with
The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
November 16-18, 2011, Changsha, China
(http://trust.csu.edu.cn/conference/TrustCom2011/)
Call for Papers
With the extensive research and development of computer, communication and control technologies, it is possible to connect all things to the Internet such that the so-called Internet of Things (IoT) can be formed. These things may be equipped with devices such as sensors, actuators, and RFID tags, in order to allow people and things to be connected anytime and anywhere, with anything and anyone. IoT will enable collaborations and communications among people and things, and among things themselves, which expand the current Internet and will radically change our personal, corporate, and community environments. When more and more things connect to the Internet, security and privacy issues become more serious, especially in the case that these things are equipped with actuators and can support control. It is essential to consider the security and privacy implications of billions of intelligent things cooperating with real and virtual entities over the Internet. SPIoT 2011 aims at providing a forum for discussing the latest academic and industrial research results in all aspects of security and privacy in IoT. Topics of interest include, but are not limited to:
l Security and privacy architectures for IoT
l Security and privacy platforms for IoT
l Security and privacy applications for IoT
l Cryptographic primitives for constrained things
l Resilience to external and internal attacks in IoT
l Identifying, authenticating, and authorizing entities in IoT
l Information accountability in IoT
l Privacy risks and massive data management in IoT
l Context-aware security in IoT
l Web services security and other application-layer issues in IoT
Publication
All accepted papers from this workshop will be published by IEEE Computer Society in TrustCom-11 conference/workshop proceedings (indexed by EI Compendex and ISTP). Distinguished papers, after further revisions, will be invited for possible publication in special issues of prestige international journals indexed by SCI and EI (pending).
Important Dates
Paper submissions due:
July 25, 2011
Notification of decision:
August 30, 2011
Camera-ready papers due:
September 30, 2011
Submission Instructions
All submissions should be written in English with a maximum length of 6 pages (or 10 pages with the over length charge) in the IEEE Conference Proceedings Format. Submissions should be sent by email to Dr. Weirong Liu (weirong_liu-AT-126.com) and cc-emailed to the workshop organizers (SPIoT2011-AT-gmail.com) with the subject "SPIoT2011 WORKSHOP PAPER SUBMISSION+First Author".
Program Co-Chairs
Indrakshi Ray, Colorado State University, USA
John Fiore, Temple University, USA
Weirong Liu, Central South University, China
PC Members (In alphabetical order)
TBD
Contact
Please email inquiries concerning ACS 2011 to:
Dr. Weirong Liu (weirong_liu-AT-126.com) and the workshop organizers (SPIoT2011-AT-gmail.com).
(IEEE SPIoT 2011)
In conjunction with
The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11)
November 16-18, 2011, Changsha, China
(http://trust.csu.edu.cn/conference/TrustCom2011/)
Call for Papers
With the extensive research and development of computer, communication and control technologies, it is possible to connect all things to the Internet such that the so-called Internet of Things (IoT) can be formed. These things may be equipped with devices such as sensors, actuators, and RFID tags, in order to allow people and things to be connected anytime and anywhere, with anything and anyone. IoT will enable collaborations and communications among people and things, and among things themselves, which expand the current Internet and will radically change our personal, corporate, and community environments. When more and more things connect to the Internet, security and privacy issues become more serious, especially in the case that these things are equipped with actuators and can support control. It is essential to consider the security and privacy implications of billions of intelligent things cooperating with real and virtual entities over the Internet. SPIoT 2011 aims at providing a forum for discussing the latest academic and industrial research results in all aspects of security and privacy in IoT. Topics of interest include, but are not limited to:
l Security and privacy architectures for IoT
l Security and privacy platforms for IoT
l Security and privacy applications for IoT
l Cryptographic primitives for constrained things
l Resilience to external and internal attacks in IoT
l Identifying, authenticating, and authorizing entities in IoT
l Information accountability in IoT
l Privacy risks and massive data management in IoT
l Context-aware security in IoT
l Web services security and other application-layer issues in IoT
Publication
All accepted papers from this workshop will be published by IEEE Computer Society in TrustCom-11 conference/workshop proceedings (indexed by EI Compendex and ISTP). Distinguished papers, after further revisions, will be invited for possible publication in special issues of prestige international journals indexed by SCI and EI (pending).
Important Dates
Paper submissions due:
July 25, 2011
Notification of decision:
August 30, 2011
Camera-ready papers due:
September 30, 2011
Submission Instructions
All submissions should be written in English with a maximum length of 6 pages (or 10 pages with the over length charge) in the IEEE Conference Proceedings Format. Submissions should be sent by email to Dr. Weirong Liu (weirong_liu-AT-126.com) and cc-emailed to the workshop organizers (SPIoT2011-AT-gmail.com) with the subject "SPIoT2011 WORKSHOP PAPER SUBMISSION+First Author".
Program Co-Chairs
Indrakshi Ray, Colorado State University, USA
John Fiore, Temple University, USA
Weirong Liu, Central South University, China
PC Members (In alphabetical order)
TBD
Contact
Please email inquiries concerning ACS 2011 to:
Dr. Weirong Liu (weirong_liu-AT-126.com) and the workshop organizers (SPIoT2011-AT-gmail.com).
Other CFPs
- 2011 IEEE International Workshop on Security and Quantum Communications (IEEE SQC 2011)
- Second International Workshop on Pattern Recognition & Intelligence Computing (WPRIC 2011)
- Third International Symposium on Mobile and Wireless Network Security (MWNS-12)
- Second International Workshop on Heterogeneous Wireless Networks (HWN-11)
- 3rd International Workshop on Wireless Computing and Networking (WCN 2011)
Last modified: 2011-07-02 22:21:48